What is the best way to protect your network? ;)

RichardJansma
Member Posts: 21
✭✭✭




I believe there are many people here that protects internet networks and using various products...
my Home network is setup by
- ISP DSL (From so home Cable) ISP Modem
- Syfer
- Ubiquiti UniFi Security Gateway USG Pro
- Ubiquitin UniFi Switch (48 Port 500w Poe+)
- Ubiquiti Unifi AP Pro
and then all onther devices. Including Synology nas and more.
also to connect we use MAC adresses
is this good and maybe any tips and tricks ;)
And what do you guys have?
Yours Sincerely,
Richard Jansma
Hypnotist, Master Magnetist, Dataist & Believer of future technology!
Yours Sincerely,
Richard Jansma
Hypnotist, Master Magnetist, Dataist & believer of future technology!
Tagged:
6
Comments
-
Community Manager at Fing
0 -
For the devices themselves, you have a great setup. Using Sypher and not solely relying on the capabilities of a DSL modem is very smart.The only suggestion that I can provide is to disable UPnP in Sypher, and be careful of how many open ports you configure for data traffic. MAC addresses can be spoofed, so be wary of relying a lot on that. Cycle through passwords on a rotation, change it every x weeks or months. Use a password generated password to ensure a secure environment. Never use human-readable words for your passwords, using a password generator and distributing that selectively is a great way to manage it."There's a fine line between audacity and idiocy."
-Warden Anastasia Luccio, Captain1 -
Joe said:If you have any VoIP services, make sure you enable any firewalls to block port 5060 from anything other than your known VoIP provider. I spotted some git from Russia trying to hack my Asterisk PBX.First of all ... you said 'git'
I haven't heard that in, ahem ... decades.
That's good advice to lock down the SIP port to only receive from a specific IP. Should be able to obtain that information from the provider easily enough."There's a fine line between audacity and idiocy."
-Warden Anastasia Luccio, Captain1 -
Pooh said:I'm seriously thinking of segmenting my Roku's, Receivers, BluRay player & Wii into the guest SSID just so they don't get to see the main network.
"There's a fine line between audacity and idiocy."
-Warden Anastasia Luccio, Captain1 -
git however is in regular parlance after Linux Torvalds named his source code control system 'git'. Telling folk the reason behind the name is still fun, thoughPeople say nothing is impossible, but I do nothing every day.1 -
Pooh said:
git however is in regular parlance after Linux Torvalds named his source code control system 'git'. Telling folk the reason behind the name is still fun, thoughHeh... Muppet.Git was a term that was used back when I was growing up, could easily start fights over being called it, too.Ahhh ... memories."There's a fine line between audacity and idiocy."
-Warden Anastasia Luccio, Captain1 -
It's a bit of a complex topic really as you've got to account for myriad vectors for attack, or intrusion, or phishing, or simply accidentally bringing some malware into the network.
I am fortunate enough to run on enterprise grade hardware, using Meraki devices for my security appliance and then a combination of Ruckus and Meraki for my WiFi access points too.
Passwords are an interesting one. Ideally points of entropy are the first port of call - a longer password with more characters is more secure than a short one with mixed letters, numbers, symbols etc.
Ideally using the browsers's secure password generator (if available), or another password manager to generate and store secure passwords which are unique to each website/service you use.
Locking down anything you can within your router's configuration, close ports you don't need to have open, geoblocking IP address ranges outside of any you don't personally deal with. Those will get you a nice start.
Have decent antivirus installed (not Norton/Symantec), make sure it's running real time protection, make sure it's updated at least every day.
If you can, lock down your user account so you don't have Admin access by default. Enable UAC, set it at the highest level you can be bothered with.
Always have at least 3 copies of all important data, in at least 2 physical locations.
Ad-blocking is another one which is useful, it reduces the chances of pulling malware onto your machine. I use Pi-hole on my network, but there's also Ghostery and uBlock Origin for most browsers on Windows.
I realise this is getting more into general safety here, but it all goes to help keep your network safe.
There's plenty of other information to add but I'll give you all a rest for now.1 -
In regards to protecting your network, or in this case on the client level, I just came across this little tidbit:While I mainly use Firefox as my default browser, and DNS over HTTPS is a toggle in the Options -> Network Settings portion, I've also installed this on my work machine and laptop so far.Curious to hear some input on it, so far it's working as intended.
"There's a fine line between audacity and idiocy."
-Warden Anastasia Luccio, Captain1 -
kltaylor said:Joe said:If you have any VoIP services, make sure you enable any firewalls to block port 5060 from anything other than your known VoIP provider. I spotted some git from Russia trying to hack my Asterisk PBX.First of all ... you said 'git'
I haven't heard that in, ahem ... decades.
That's good advice to lock down the SIP port to only receive from a specific IP. Should be able to obtain that information from the provider easily enough.kltaylor said:First of all ... you said 'git'I haven't heard that in, ahem ... decades.
That's good advice to lock down the SIP port to only receive from a specific IP. Should be able to obtain that information from the provider easily enough.
2 -
I run a Firewall appliance using Untangle in bridge mode behind my router on the Lan side. Typically a Firewall appliance is installed at the “edge” of a network however I run a set of VPN tunnels from my multi WAN router to an AWS EC2 instance that for simplicity, I do not want to screw around with. I did try running PF Sense. After spending much time and effort, I could not get it to run in bridge mode where as Untangle facilitates this as part of the initial install. The default Untangle settings are very good out of the box. My appliance is a “cheap” fan-less Qotom with an I5 processor which I upgraded the SSD on. The Untangle forum is very user friendly for those less knowledgeable.
The Fixed Wireless Router/Modems that my ISP provides do not expose the firewall so I have no idea how good they are and lots get them and are caught by my Untangle Firewall which uses a dynamic list from a threat service. I do not use my main commercial router’s firewall as I am not proficient enough to build the rule set required.
I also use scanning programs and VPN programs.
So my biggest threat is in my actions in how I use the internet.1
Categories
- 5.8K All Categories
- 2.8K Ask about Connected Technology
- How To...
- 1.1K Devices & Security
- 1.6K Network Troubleshooting & Connectivity
- 114 General Discussion, Weird & Wonderful
- 45 Network Infrastructure
- 5.4K Ask about Fing
- 545 Fing Account Change Request
- 1.1K Fing Desktop
- 1.4K Fing App
- 1.7K Fingbox
- 534 Announcements, Beta Testing & Release Notes
- 158 Community Updates
- 29 Getting started
- 13 Community User Guides